61. Cybercrimes
Author: / Sumit Ghosh ... Ed
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Computer crimes,Computer security
Classification :
HV
6773
.
C93
2010


62. Cybercrimes
Author: / Sumit Ghosh ... Ed
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes.,Computer security.
Classification :
HV
,
6773
,.
C93
,
2010


63. Cybercrimes
Author: / Sumit Ghosh ... Ed
Library: Special Library of Law (Tehran)
Subject: Computer crimes,Computer security
Classification :
HV6773
.
C93
2010
,
DB2747


64. Cybercrimes
Author: / Sumit Ghosh ... Ed.
Library: Faculty of Law and Political Sciences (Tehran)
Subject: Computer crimes,Computer security
Classification :
HV6773
.
C93


65. Cybercrimes: A Multidisciplinary Analysis
Author: / Editiors Sumit Ghosh, Elliot Turrini
Library: Library of Islamic Encyclopedia Foundation (Tehran)
Subject: جرایم کامپیوتری,Computer crimes,Computer security, کامپیوترها -- ایمنی اطلاعات
Classification :
HV6773
.
C9


66. Cybercrimes :a multidisciplinary analysis
Author: Sumit Ghosh ... Ed
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer crimes,، Computer security
Classification :
HV
6773
.
C93


67. Cybercrimes a multidisciplinary analysis
Author: / Sumit Ghosh ... Ed
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer crimes,Computer security
Classification :
HV6773
.
C93
2010


68. Cybercrimes: a multidisciplinary analysis
Author: Sumit Ghosh ... Ed
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer crimes,، Computer security
Classification :
HV
6773
.
C93
2010


69. Cyberpunk :
Author: Katie Hafner and John Markoff.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
H34
1991


70. Cybersecurity :
Author: Damien Van Puyvelde, Aaron Brantly.,Van Puyvelde, Damien,
Library: Faculty of Law and Political Sciences (Tehran)
Subject: Internet,Computer security,Internet governance.,Internet,Computer crimes,Security, International.,Government policy.,Government policy.,Political aspects.,Prevention.
Classification :
TK5105
.
59
.
V3C9


71. Cybersecurity
Author: Thomas J. Mowbray ; technical editor, Rob Shimonski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Cyberspace-- Security measures.,Information technology-- Security measures.

72. Cybersecurity Policies and Strategies for Cyberwarfare Prevention
Author: / Jean-Loup Richet,Richet, Jean-Loup
Library: Special Library of Law (Tehran)
Subject: Cyberterrorism -- Prevention,Cyber intelligence (Computer security),Cyberspace operations (Military science),Computer crimes -- Prevention
Classification :
HV6773
.
15
.
C97
R525
2015
,
DB6589


73. Cybersecurity and privacy in cyber-physical systems /
Author: edited by Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,BUSINESS & ECONOMICS-- Infrastructure.,Computer crimes.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Networking-- General.,COMPUTERS-- Security-- General.,SOCIAL SCIENCE-- General.
Classification :
HV6772
.
C93
2019


74. Cybersecurity, cyberanalysis, and warning /
Author: Kerry T. Norwood and Sandra P. Catwell, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automatic data collection systems.,Computer crimes-- United States-- Prevention.,Computer networks-- Security measures-- United States.,Cyberterrorism-- United States-- Prevention.,Electronic government information-- Access control-- United States.,Electronic government information-- Protection-- Government policy-- United States.,Automatic data collection systems.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyberterrorism-- Prevention.,Electronic government information-- Access control.,POLITICAL SCIENCE-- Public Affairs & Administration.,United States., 7
Classification :
TK5105
.
59


75. Cybersecurity ethics :
Author: Mary Manjikian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer networks-- Security measures-- Moral and ethical aspects.,Internet-- Moral and ethical aspects.,BUSINESS & ECONOMICS-- Business Ethics.,Computer crimes.,Computersicherheit,Ethik,Informationstechnik,Internet-- Moral and ethical aspects.
Classification :
TK5105
.
878
.
M36
2018


76. Cybersecurity incident response :
Author: Eric C. Thompson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security-- Management.,Computer crimes.,Computer security-- Management.
Classification :
QA76
.
9
.
A25


77. Cybersecurity policies and strategies for cyberwarfare prevention /
Author: Jean-Loup Richet, University of Nantes, France.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Cyber intelligence (Computer security),Cyberspace operations (Military science),Cyberterrorism-- Prevention.
Classification :
HV6773
.
15
.
C97
C923
2015


78. Data security breaches and privacy in Europe /
Author: Rebecca Wong
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Europe,Computer security-- Europe,Data protection-- Law and legislation-- Europe
Classification :
QA76
.
9
.
A25
W652
2013


79. Deep Learning Applications for Cyber Security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Big data. ; Computer crimes. ; Computer security. ; Big Data. ;

80. Digital Forensics and Cyber Crime
Author: \ Petr Matoušek, Martin Schmiedecker (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer crimes -- Investigation -- Congresses. ,Computer security -- Congresses.,جرایم کامپیوتری -- پیجویی -- کنگره ها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
E-Book
,
